Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security

by 

Aseel AlShuaibi ;

Muhammad Waqas Arshad ;

Mohammed Maayah

PDF logoPDF

Published: 2025/05/08

Abstract

The growing dependence on technology to store, process, and transmit data across interconnected systems has significantly elevated the need for robust data security. Modern computer systems emphasize the critical principles of authentication and data integrity. With the rise in cyber threats, the importance of securing data transactions against unauthorized or unintentional modifications has become more apparent than ever. As computers continue to play an increasingly vital role in daily operations, managing and safeguarding data alterations is essential. To address these challenges, businesses must adopt proactive measures to reinforce the security of sensitive data and passwords. Hashing functions, a well-established cryptographic approach, have proven effective in addressing a wide range of authentication and data integrity issues. A hash function generates a fixed-length output, known as a "digest," from an input. This one-way function is irreversible, providing a secure method of encoding data. However, hash functions are still vulnerable to various attacks, including dictionary attacks, brute-force attacks, and the use of lookup tables. The strength of a hashing function can be evaluated based on the number of attempts required to break it, the size of the hash key, and the specific algorithm employed. In response, this study proposes a novel hashing technique that integrates a Genetic Algorithm (GA) and Hidden Markov Models within a block hashing framework. Inspired by evolutionary biology, the GA applies operators such as mutation, crossover (recombination), and selection to simulate natural selection, offering a dynamic and efficient method for enhancing data security. The proposed algorithm utilizes the Hill cipher as an encryption mechanism and incorporates a singular Hill cipher key matrix to enhance security and reduce the likelihood of hash collisions or reversals. Experimental results demonstrate that the developed algorithm exhibits strong resistance to multiple attack types and outperforms several existing methods in terms of accuracy and robustness.

Keywords

CryptographyHash FunctionGenetic AlgorithmEncryptionCybersecurity,Data ProtectionHidden MarkovHill CipherPlaintextCiphertextFitness FunctionAlgorithmsMetrics

How to Cite the Article

Alshuaibi, A., Arshad, M. W., & Maayah, M. (2025). A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security. Journal of Cyber Security and Risk Auditing, 2025(3), 42–56. https://doi.org/10.63180/jcsra.thestap.2025.3.6https://doi.org/10.63180/jcsra.thestap.2025.3.6

References

  1. Naik, R. Lakshman, Sourabh Jain, and Manjula Bairam. "Development of hybrid weighted networks of RNN and DBN for facilitating the secure information system in cyber security using meta-heuristic improvement." Wireless Networks (2025): 1-36.
  2. Ganesh, N. S., et al. "Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing." Wireless Networks 31.3 (2025): 2389-2417.
  3. Ali, A., Almaiah, M. A., Hajjej, F., Pasha, M. F., Fang, O. H., Khan, R., ... & Zakarya, M. (2022). An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors, 22(2), 572.
  4. Almaiah, M. A., Ali, A., Hajjej, F., Pasha, M. F., & Alohali, M. A. (2022). A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors, 22(6), 2112.
  5. Almaiah, M. A., Yelisetti, S., Arya, L., Babu Christopher, N. K., Kaliappan, K., Vellaisamy, P., ... & Alkdour, T. (2023). A novel approach for improving the security of IoT–medical data systems using an enhanced dynamic Bayesian network. Electronics, 12(20), 4316.
  6. Pittalia, P. P. (2019). A comparative study of hash algorithms in cryptography. International Journal of Computer Science and Mobile Computing, 8(6), 147-152.
  7. Pujari, S.K., Bhattacharjee, G., Bhoi, S., A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence, Procedia Computer Science, 2018.
  8. Chikkareddi, V., Ghosh, A., Jagtap, P., Joshi, S., & Kanzaria, J. (2020). Hybrid image encryption technique using Genetic algorithm and Lorenz Chaotic system. In ITM Web of Conferences (Vol. 32, p. 03009). EDP Sciences. ‏
  9. Jiang, C., Pang, Y., & Wu, A. (2015, November). A novel robust image-hashing method for content authentication. In 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) (pp. 22-27). IEEE.
  10. Almaiah, M. A., Hajjej, F., Ali, A., Pasha, M. F., & Almomani, O. (2022). A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors, 22(4), 1448.
  11. AlSalem, T. S., Almaiah, M. A., & Lutfi, A. (2023). Cybersecurity risk analysis in the IoT: A systematic review. Electronics, 12(18), 3958.
  12. Altulaihan, E., Almaiah, M. A., & Aljughaiman, A. (2024). Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms. Sensors, 24(2), 713.
  13. Wong, K. W., Yap, W. S., Wong, D. C. K., Phan, R. C. W., & Goi, B. M. (2020). Cryptanalysis of genetic algorithm-based encryption scheme. Multimedia Tools and Applications, 79(35), 25259-25276.
  14. Rodríguez, J., Corredor, B., & Suarez, C. (2019). Genetic Operators Applied to Symmetric Cryptography. International Journal of Interactive Multimedia & Artificial Intelligence, 5(7).
  15. Sheeja, S. (2017). Secure symmetric encryption scheme using genetic algorithm. International Journal of Applied Engineering Research, 12(21), 10828-10833.
  16. Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425.
  17. Nazeer, M. I., Mallah, G. A., Shaikh, N. A., Bhatra, R., Memon, R. A., & Mangrio, M. I. (2018). Implication of genetic algorithm in cryptography to enhance security. International Journal of Advanced Computer Science and Applications, 9(6), 375-379.
  18. Chunka, C., Goswami, R. S., & Banerjee, S. (2019). A novel approach to generate symmetric key in cryptography using genetic algorithm (ga). In Emerging Technologies in Data Mining and Information Security (pp. 713-724). Springer, Singapore.
  19. Jawaid, S., & Jamal, A. (2014). Generating the best fit key in cryptography using genetic algorithm. International Journal of Computer Applications, 98(20), 33-39.
  20. Siam, A. I., Almaiah, M. A., Al-Zahrani, A., Elazm, A. A., El Banby, G. M., El-Shafai, W., ... & El-Bahnasawy, N. A. (2021). Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications. Computational Intelligence and Neuroscience, 2021(1), 8016525.
  21. AlSalem, T. S., Almaiah, M. A., & Lutfi, A. (2023). Cybersecurity risk analysis in the IoT: A systematic review. Electronics, 12(18), 3958.
  22. Almaiah, M. A., Al-Zahrani, A., Almomani, O., & Alhwaitat, A. K. (2021). Classification of cyber security threats on mobile devices and applications. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications (pp. 107-123). Cham: Springer International Publishing.‏
  23. Afarin, R., & Mozaffari, S. (2013, August). Image encryption using genetic algorithm and binary patterns. In 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC) (pp. 1-5). IEEE.
  24. Almomani, O., Almaiah, M. A., Alsaaidah, A., Smadi, S., Mohammad, A. H., & Althunibat, A. (2021, July). Machine learning classifiers for network intrusion detection system: comparative study. In 2021 International Conference on Information Technology (ICIT) (pp. 440-445). IEEE.‏
  25. Soni, A., & Agrawal, S. (2012). Using genetic algorithm for symmetric key generation in image encryption. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(10), 137-140.
  26. Almaiah, M. A., Dawahdeh, Z., Almomani, O., Alsaaidah, A., Al-Khasawneh, A., & Khawatreh, S. (2020). A new hybrid text encryption approach over mobile ad hoc network. Int. J. Electr. Comput. Eng.(IJECE), 10(6), 6461-6471.
  27. Alamer, M., & Almaiah, M. A. (2021, July). Cybersecurity in Smart City: A systematic mapping study. In 2021 international conference on information technology (ICIT) (pp. 719-724). IEEE.
  28. F. Ahamad, Mohd. Shahid ,S. Khalid (2012), ”Encrypting The Information Using The Features of Mimetic Algorithm With Encryption and Decryption Technique” , (IJERA) International Journal of the Engineering Research and the Applications, Vol. 2nd, Issue 3rd, May-Jun 2012, page.3049-3051.
  29. N. Kumar, R.Bedi, Rajneesh Kaur (2011), “A Special Technique for the Information Cryptography by Using Genetic Algorithms and Brain Mu Waves”, International Journal of Scientific and Engineering Research Volume 2nd, Issue 5th, June 2011 ISSN 2229-5518.
  30. A. Aggarwal (2012), “The Secret Key Data Encryption Algorithm Using Genetic Algorithm” at IJARCSSE, 2012.‏
  31. Singh, D., Rani, P., & Kumar, R. (2013). To design a genetic algorithm for cryptography to enhance the security. Int J Innov Eng Technol (IJIET), 2(2), 380-385.
  32. Bhandari, S. U., Subbaraman, S., Pujari, S., & Mahajan, R. (2009, May). Real time video processing on FPGA using on the fly partial reconfiguration. In 2009 International Conference on Signal Processing Systems (pp. 244-247). IEEE.‏
  33. Bartkewitz, T. (2009). Building hash functions from block ciphers, their security and implementation properties. Ruhr-University Bochum.
  34. Jhingran, R., Thada, V., & Dhaka, S. (2015). A study on cryptography using genetic algorithm. International Journal of Computer Applications, 118(20).
  35. Kumar, A., & Chatterjee, K. (2016, March). An efficient stream cipher using genetic algorithm. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 2322-2326). IEEE.
  36. Mishra, S., & Bali, S. (2013). Public key cryptography using genetic algorithm. International Journal of Recent Technology and Engineering, 2(2), 150-154.
  37. Adil, M., Almaiah, M. A., Omar Alsayed, A., & Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors, 20(8), 2311.
  38. Bubukayr, M. A. S., & Almaiah, M. A. (2021, July). Cybersecurity concerns in smart-phones and applications: A survey. In 2021 international conference on information technology (ICIT) (pp. 725-731). IEEE.
  39. CHOKPRASOMBAT, K. (2011). Synthesis of patterned media by self-assembly of FePt nanoparticles. Walailak Journal of Science and Technology (WJST), 8(2), 87-96.
  40. Kalsi, S., Kaur, H., & Chang, V. (2018). DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation. Journal of medical systems, 42(1), 1-12.
  41. Venkatesan, R., Anni Princy, B., Ambeth Kumar, V. D., Raghuraman, M., Gupta, M. K., Kumar, A., ... & Khan, A. K. (2021). Secure online payment through facial recognition and proxy detection with the help of TripleDES encryption. Journal of Discrete Mathematical Sciences and Cryptography, 24(8), 2195-2205.
  42. Ramamurthy, R., Bauckhage, C., Buza, K., & Wrobel, S. (2017, September). Using echo state networks for cryptography. In International Conference on Artificial Neural Networks (pp. 663-671). Springer, Cham.
  43. Hussain, U. N., Chithralekha, T., Raj, A. N., Sathish, G., & Dharani, A. (2012). A hybrid DNA algorithm for DES using central dogma of molecular biology (CDMB). International Journal of Computer Applications, 42(20), 1-4.